0% found this document useful (0 votes)
90 views7 pages

Confusion and Diffusion: Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003

This document discusses the concepts of confusion and diffusion in cryptography. It explains that confusion involves using a complex key to encrypt plaintext in a way that makes deducing the key difficult even if statistics of the plaintext are known. Diffusion refers to dissipating the statistical structure of plaintext across ciphertext so the long-range statistics of ciphertext do not reveal the plaintext. Both confusion and diffusion aim to complicate statistical cryptanalysis of encryption algorithms.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views7 pages

Confusion and Diffusion: Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003

This document discusses the concepts of confusion and diffusion in cryptography. It explains that confusion involves using a complex key to encrypt plaintext in a way that makes deducing the key difficult even if statistics of the plaintext are known. Diffusion refers to dissipating the statistical structure of plaintext across ciphertext so the long-range statistics of ciphertext do not reveal the plaintext. Both confusion and diffusion aim to complicate statistical cryptanalysis of encryption algorithms.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Confusion and Diffusion

Ref: William Stallings,


Cryptography and Network Security,
3rd Edition, Prentice Hall, 2003

Confusion and Diffusion 1


Statistics and Plaintext
• Suppose the frequency distribution of
plaintext in a human-readable message in
some language is known.
• Or suppose there are known words or
phrases that are used in the plaintext
message.
• A cryptanalysist can use this information to
break a cryptographic algorithm.
Confusion and Diffusion 2
Changing Statistics
• Claude Shannon suggested that to complicate
statistical attacks, the cryptographer could
dissipate the statistical structure of the
plaintext in the long range statistics of the
ciphertext.
• Shannon called this process diffusion.

Confusion and Diffusion 3


Changing Statistics (p.2)
• Diffusion can be accomplished by having
many plaintext characters affect each
ciphertext character.
• An example of diffusion is the encryption
of a message M=m1,m2,... using a an
averaging: yn= i=1,k mn+i(mod26).

Confusion and Diffusion 4


Changing Statistics (p.3)
• In binary block ciphers, such as the Data
Encryption Standard (DES), diffusion can
be accomplished using permutations on
data, and then applying a function to the
permutation to produce ciphertext.

Confusion and Diffusion 5


Complex Use of a Key
• Diffusion complicates the statistics of the
ciphertext, and makes it difficult to discover
the key of the encryption process.
• The process of confusion, makes the use of
the key so complex, that even when an
attacker knows the statistics, it is still
difficult to deduce the key.

Confusion and Diffusion 6


Complex Use of a Key(p.2)
• Confusion can be accomplished by using a
complex substitution algorithm.
• Block ciphers, such as the Data Encryption
Standard, makes use of substitution
operations.

Confusion and Diffusion 7

You might also like